CVE-2026-4001 (CRITICAL 9.8)
WooCommerce Custom Product Addons Pro allows unauthenticated RCE via eval() misuse.
🔎 Full analysis:
https://basefortify.eu/cve_reports/2026/03/cve-2026-4001.html
| Company name | Axxemble |
| Our ISMS | https://Base27.eu |
| https://www.linkedin.com/showcase/basefortify | |
| YouTube | https://www.youtube.com/@BaseFortify |
| https://www.instagram.com/basefortify/ | |
| Website | https://basefortify.eu/ |
Mitigation:
• Update plugin immediately (if patch available)
• Disable custom pricing formulas
• Restrict public input fields
• Monitor for suspicious requests
BaseFortify helps detect & prioritize risks:
https://basefortify.eu/
Technical details:
• CWE-95: eval() injection
• User input passed to PHP eval()
• No proper sanitization/escaping
• Works without authentication
Impact: Full server takeover
CVE-2026-4001 (CRITICAL 9.8)
WooCommerce Custom Product Addons Pro allows unauthenticated RCE via eval() misuse.
🔎 Full analysis:
https://basefortify.eu/cve_reports/2026/03/cve-2026-4001.html
🚨 Attackers exploited the Trivy supply chain to spread an infostealer, leading to credential theft and Kubernetes attacks.
If you use Trivy, this may impact your environment.
Read the full breakdown:
https://basefortify.eu/posts/2026/03/attackers_exploit_trivy_supply_chain_to_steal_credentials_and_target_kubernetes.html
Mitigation:
• Restrict local user access
• Monitor SYSTEM-level process behavior
• Apply vendor updates when available
• Limit use of affected ERM version
BaseFortify helps detect & prioritize such risks:
https://basefortify.eu/
Technical details:
• CWE-250: Execution with excessive privileges
• SYSTEM-level processes spawned incorrectly
• File dialogs run as SYSTEM
• Modify/delete protected files
Impact: Full system compromise from local access
CVE-2026-4606 (CRITICAL 10.0)
GV Edge ERM runs with SYSTEM privileges, allowing any local user to gain full OS control.
🔎 Full analysis:
https://basefortify.eu/cve_reports/2026/03/cve-2026-4606.html
Mitigation:
✔ Update OpenClaw to 2026.2.19 or later
✔ Validate and sanitize all file path inputs
✔ Monitor temp directories for suspicious files
✔ Restrict file system permissions
Track vulnerabilities across your stack:
https://basefortify.eu/
Technical summary:
Weakness: CWE-22 (Path Traversal)
Untrusted input is used to build file paths without proper sanitization.
Impact:
• Arbitrary file write
• Potential remote code execution
• Tampering with application files
Affected: OpenClaw < 2026.2.19
🚨 CVE-2026-22171 – HIGH (8.8)
Path Traversal in OpenClaw Feishu media download allows arbitrary file write.
Attackers can manipulate media keys to escape temp directories and write files on the system.
Full report:
https://basefortify.eu/cve_reports/2026/03/cve-2026-22171.html